Department of Computer Science
|
||||||
Sr.No.
|
Title | Researcher | Superviser | Year of Pub | Subject | Acc.No. |
1
|
Study of diagnosis thyroid diseases using artificial neural network | Chatar, P.N | Ghatol, A. A. | 2001 | Computer Science | 561 |
2
|
A Study of Implications of computer and Computer Network in the Field or Banking | Choubey, N.S | Kaptan, S.S | 2002 | Computer Science | 777 |
3
|
Artiftical neural network based speech recognition by feature extraction analysis | Patil, Pramod B | Ingole, V.T | 2006 | Computer Science | 1359 |
4
|
Study of effective design methods and implementation of E-learning sofeware | Dharaskar,Rajiv V. | Thakre,Vilas M. | 2006 | Computer Science | 1389 |
5
|
Investigatjions in numeral Character recognition | Chaudhari, Prasad | Chaudhari, N.S | 2007 | Computer Science | 1642 |
6
|
Development of Segmentation Techniques for Finger Print Recognition System | Jambhokar, S. S. | Kale, K. V. | 2007 | Computer Science | 1689 |
7
|
View Optimization in Data Warehousing Systems | Dhote, C.A. | Ali, S. | 2008 | Computer Science | 1756 |
8
|
Resource Scheduling in Multimedia Operating | Junaid, A. M. | Ali, M. S. | 2008 | Computer Science | 1783 |
9
|
Fractal Color Image Compression | Koli, N. A. | Ali, M. S. | 2008 | Computer Science | 1823 |
10
|
Optimized Compilation for Real Time Embedded Systems | Raut, A. M. | Ali, M. S. | 2008 | Computer Science | 2101 |
11
|
Study of Multivalued Logic Applications and Its Verification | Dakhole, P. K. | Wakde, D. G. | 2008 | Computer Science | 2102 |
12
|
Digital Watermarking and Data Hiding Techniques for Multimedia Autheritication | Sherekar, S. S. | Jain, S. | 2010 | Computer Science | 1970 |
13
|
Document Analysis : A Text Based Approach | Dhore, M. P. | Kale, K. V. | 2010 | Computer Science | 2125 |
14
|
An Adaptive Tutor Modes for Web - based Intelligent Tatoring System | Alvi, A. S. | Ali, M. S. | 2010 | Computer Science | 2048 |
15
|
TRANSACTION SCHEDULING IN ACTIVE REAL-TIME DATABASE SYSTEM | SUNIL R. GUPTA | DR.MIR SADIQUE ALI | 2010 | Computer Science | 2507 |
16
|
High Performance Multicast Congestion Control in Computer Communication Networks | Chaudhari, D. N. | Thakare, V. M. | 2010 | Computer Science | 2094 |
17
|
An Architecture for Real - Time Object -Orented Distributed Database | Khan, S.S. | Ali, M. S. | 2010 | Computer Science | 2100 |
18
|
Study of Different Data Mining Methods and Design of Data Mining ----- Problem Domain | Deshpande, S.P. | Thakare, V. M. | 2010 | Computer Science | 2121 |
19
|
DEVELOPMENT OF GUJARATI HANDWRITTEN CHARACTER RECOGNITION SYSTEM | MAMTA NARAYANDASJI MALOO | DR.KARBHARI V. KALE | 2011 | Computer Science | 2438 |
20
|
AN EFFICIENT APPROACH FOR MATERIALIZED VIEW SELECTION AND MAINTANACE USING QUERY OPTIMIZATION | PRAVIN P. KARDE | DR.V.M.THAKARE | 2011 | Computer Science | 2539 |
21
|
SECURITY - AWARE ROUTING PROTOCALS FOR MOBILE AD HOC NETWORKS | PRADIP M. JAWANDHIYA | DR. MIR SADIQUE ALI | 2011 | Computer Science | 2498 |
22
|
Optimal Strategy for CPG Induction using Genetic Algorithm | Choubey, N. S. | Kharat, M. U. | 2012 | Computer Science | 2204 |
23
|
DYNAMIC RESOURCE MANGEMENT USING ADAPTIVE TECHNIQUE IN DISTREIBUTED SYSTEMS | MS. VARSHA S. TONDRE | DR. R. V. DHARASKAR | 2012 | Computer Science | 2627 |
24
|
A SOFT COMPUTING APPROACH TO ANTI BASED ROUTING IN MOBILE AD HOC NETWORKS | SUNIL B. WANKHEDE | DR.MIR SADIQUE ALI | 2012 | Computer Science | 2748 |
25
|
STUDY, DESIGN AND IMPLEMENTATIONS OF E-ELECTIONS SYSTEM MODEL USING OLAP ALGORITHMS | VINOD M. PATIL | DR.SANJEEV JAIN | 2012 | Computer Science | 2431 |
26
|
A DYNAMIC COURSEWARE GENERATOR USING EFFICACY- BASED CONTGENT FOR BASED INTELLIGENT TUTORING SYSTEM | PRASANNA M. HSABNIS | DR.MIR. SADIQUE ALI | 2012 | Computer Science | 2553 |
27
|
STUDY OF IMPLEMENTATION ISSUES OF 3G VISUALIZATION ON MOBILE PLATFORMS | U.S.JUNGHARE | DR.R.V.DHARASKAR | 2012 | Computer Science | 2395 |
28
|
DATA INTEGRATION TECHNIQUES IN SEMANTIC WEB MINING GRID WITH SPECIFIC FEATURES OF INTEROPERABILITY | HEMANT S. MAHALLE | DR. VINAY CHAVAN | 2012 | Computer Science | 2584 |
29
|
A Soft Computing Approach to Antibased Routing in Mobile Ad Hoc Networks | Wankhade,Sunil B | Ali,Mir Sidique | 2012 | Computer Eng. | 4819 |
30
|
Ontdogy Driven information Retrieval for Rank Based indexing Scheme Using Vector Space Model in Semantic Web | Manwar,Avinash B | Chovhan,Vinay | 2012 | Computer Eng. | 4962 |
31
|
Patteren Learnign of Sports News Extraction in Onling Reopositories | Sirsat, S.R | Chavan, V | 2013 | Computer Science | 2322 |
32
|
ADAPTIVE COMPRESSION TECHNIQUES AND EFFICIENT QUERY EVALUTION FOR XML DATABASES | VIJAY S.GULHANE | DR. MIR SADIQUE ALI | 2013 | Computer Science | 2720 |
33
|
OBJECTED ORIENTED DATA MODEL AND PROCESS MODEL FOR WEB INFORMATION SYSTEMS | DAYANAND RAGHAO INGLE | DR. B.B. MESHRAM | 2013 | Computer Science | 2843 |
34
|
SECURE RETRIEVAL INTELLIGENT ENGINE OF VIDEO DATA USING DATA MINING | BHAVESH V. PATEL | DR.B.B. MESHRAM | 2013 | Computer Science | 2888 |
35
|
TASK SCHEDULING IN REAL-TIME OPERATING SYSTEM USING SOFT-COMPUTING TECHNIQUES | MIR ASHFAQUE ALI | DR. S. A. LADHAKE | 2013 | Computer Science | 2715 |
36
|
Disk Scheauling in real-time Data base Transactions | Amdani,Salim Y | Ali,Mir Sidique | 2013 | Computer Eng. | 4705 |
37
|
A Generic Framework for Fuzzy Expert System for Medical Diagnosis | Sikchi,Smita Sushil | Ali,Mir Sidique | 2013 | Computer Eng. | 4707 |
38
|
FUZZY CLUSTERING IN WEB MINING | MS. ANJALI B. RAUT | DR. G.R. BAMNOTE | 2014 | Computer Science | 2691 |
39
|
DESIGN OF CENTRALIZED AND DISTRIBUTED ARCHITECTURE OF LARGE DATABASE IN HEAVY TRAFFIC LAN | SHAILESH R. THAKARE | DR. CHITRA A. DHAWALE | 2014 | Computer Science | 2703 |
40
|
IMROVISATION OF MULTIMEDEA E-LEARNING BY USING CONTEXTUAL DATA | SUSHILKUMAR R.KHLMEGH | DR.SACHIN N.DESHMUKH | 2014 | Computer Science | 2709 |
41
|
CONSTRUCTION OF MULTIFARIOUS SECRET SHARING SCHEME WITH AUGMENTED CAPABILITIES | SONALI D. PATIL | DR. P. R. DESHMUKH | 2014 | Computer Science | 2776 |
42
|
ENHANCEMENT OF ASSOCIATION RULES FROM STRUCTURED XML DOCUMENT | SHEETAL V. RATHI | DR.C.A. DHOTE | 2014 | Computer Science | 2783 |
43
|
CARAPACE FOR INTRANET SECURITY | PREMCHAND B.AMBHORE | DR.B.BMESHRAM | 2014 | Computer Science | 2871 |
44
|
AN EFFICIENT ALGORITHM FOR POLLEN CLASSIFICATION USING COMPUTATIONAL INTELLIGENCE APPROACHES | VIJAY R.DHAWALE | DR. S. V. DUDUL | 2014 | Computer Science | 2897 |
45
|
"REAL TIME ORGANIZED HUMAN FACE RETRIEVAL TECHNIQUE FROM LARGE SCALE VIDEO DATABASES" | ZAFARAHMAD G. SHEIKH | DR. V.M. THAKARE | 2014 | Computer Science | 2901 |
46
|
DESIGN AND IMPLEMENTION OF A NEW XML QUERY ENGINE WITH EFFICIENT INDEXING SUPPORT | ATUL DIGAMBARRAO RAUT | DR. MOHAMMED ATIQUE MOHAMMAD JUNAID | 2014 | Computer Science | 2926 |
47
|
Computer Modeliving & Simulation for Complex Analysis of Soil Mensuratior Using Fuzzy Sets | Mawale,Maya V | Chovhan,Vinay | 2014 | Computer Eng. | 4965 |
48
|
Study & Analysis of effectiveness of Brandwidth Optimization Parameters in Wireless Networks | Gumaste,Shyamrao V | Kharat,Madan V | 2014 | Computer Eng. | 4986 |
49
|
Study for Recognition of Handwritten Text of Modi Scrift | Besekar,Dipak N | Ramteke,R.T | 2014 | Computer Eng. | 4989 |
50
|
Fuzzy Expert System for Pathological Investigation & Diagnosis | Satarar,Shrikant L | Ali,Mir Sidique | 2014 | Computer Eng. | 5017 |
51
|
GENERIC FRAMEWORK OF SIGN LANGUAGE RECOGNITION | MR.PRAVIN RAMKRISHNA FUTANE | DR. RAJIV V.DHARASKAR | 2015 | Computer Science | 2763 |
52
|
DESIGN AND DEVELOPMENT OF AN EFFICIENT XML PARSING ALGORITHM | VAISHALI M.DESHMUKH | DR.G.R.BAMNOTE | 2015 | Computer Science | 2854 |
53
|
DESIGN OF PREDECTIVE DATA MINING METHODOLOGY FOR CLINICAL DATA USING SOFT COMPUTING | MADHURI S.SULE | DR.G.R.BAMNOTE | 2015 | Computer Science | 2861 |
54
|
Multistage Document Clustering Using Soft Computing Aproach | Patil,Leens H | Atique,Mohammed | 2015 | Computer Eng. | 4813 |
55
|
Active Warden & Definite Minimal Requistite Fidelity for Elimination Covert Communication in TCP/IP | Dakhane,Dhanajay.M | Deshmukh,Prashant | 2015 | Computer Eng. | 4814 |
56
|
Implemchtation of Web Vsage Mining Techniques to Investigate Behavior and Crime Patterns of the Web Users | Patange,Deepti V | Butey,P.K | 2015 | Computer Eng. | 4988 |
57
|
Design of A Reliable Task Scheduling Algoritham for Wireless Distributed Systems. | Bobkhe,S.T. | Mahajan, A.R. | 2016 | Computer Science | 2999 |
58
|
Framework for Adaptire Mobile Interaes | Walse,K.H. | Dharaskar, R.V | 2016 | Computer Science | 3097 |
59
|
Study and Design of an Integrated Crypto - Steganographic Data Security Algorithm for Mobile Communication | Jambhekar, N.D. | Dhawale, C.A. | 2016 | Computer Science | 3452 |
60
|
Evaluation and Recognition of feeling Based Music on Mobile Device Platform | Nawasakar, R. K. | Batey, P.K. | 2016 | Computer Science | 3458 |
61
|
A Morphological Approach to Video Processing On Mobile Phone | Kasat, Dipali | Jain,S. | 2016 | Computer Science | 3506 |
62
|
Implementation of Effecient Mobile Multimedia Application in Cloud Compuating Platform | Londhe, R. D. | Sherekar, S. S. | 2016 | Computer Science | 4069 |
63
|
Deveopment of an Intelligent Methodology Using Soft Computing for Early Decision Making for Diagnosis of Cancer | Shetiye, P.C. | Ghatol, A.A. | 2016 | Computer Science | 3841 |
64
|
Development of an Intelligent Methodology Using Soft Computing for Early Decision Making for Diagnosis of Cancer | Shetiye,Parveen | Ghotal,Ashok A | 2016 | Computer Engg. | 4328 |
65
|
An Efficient Machine Learning Approch in Text Document Classification | Mohod,Sudhir W | Dhote,C.A | 2016 | Computer Eng. | 4708 |
66
|
Representation and Analysis of affect Data & Peredictive Pattern Generation | Sugandhi,Rekha S | Mahajan,Anjali.R | 2016 | Computer Eng. | 4709 |
67
|
Design of An Efficient Approach to improve the performance of information Retrieval in web Search engine Rusults | Keole,Ranjit P | Karde,P.P | 2016 | Computer Eng. | 4754 |
68
|
Heuristic Clustering Based Pattern Recognization System to Provide e-learning support to visually impaired persons | Palaskar,A.N | Warnekar,C.S | 2016 | Computer Eng. | 5026 |
69
|
Approach for Emotion Extraction from Subject Related Natural Text. | Shelke,N. | Deshpande,S.P. | 2017 | Computer Science | 2996 |
70
|
Semantically Driven Content Based Image Retrival and Ranking Throuth SoftCompiting Approach | Dhotre,D.R. | Bamnote, B. R. | 2017 | Computer Science | 3005 |
71
|
A Reliable Power Rooting Scheme for Mobile ADHoc Network | Shahade, M. R. | Chaudhari. D. N. | 2017 | Computer Science | 3370 |
72
|
Some Enhancement in Biometric Recognition of Fass and Facial Expression | Satange,D.N. | Ramteke, R.J | 2017 | Computer Science | 2980 |
73
|
Limiting the Preemption of Transactions in Real- Time Database System | Bhure,S.A. | Alvi,A.S | 2017 | Computer Science | 3221 |
74
|
Implementing Efficient Routing with Secured Environment in Mobile Computing | Borkar,M.B. | Mahajan,A.K | 2017 | Computer Science | 3231 |
75
|
Data Resource Management for Agility Elasticity and Adaptability in Cloud Computing | Deshmukh,H..M | Chavan,V. | 2017 | Computer Science | 3125 |
76
|
Implementing Efficient Routing with Secured Environment in Mobile Computing | Borkar,G.M | Mahajan,A.R | 2017 | Computer Engg. | 4215 |
77
|
Secured Protocol Against Network Layer Attacks In Mobile AD HOC Networks | Karde, S. K. | Sarode, M.V. | 2018 | Computer Science | 3473 |
78
|
Enhancement of Information Security Using Image Fusion & Visal Cryptography | Gadicha,V.B. | Rao,Y.R.M. | 2018 | Computer Science | 3201 |
79
|
Design & Development of Context -Aware Secare Routing Architecture in Internet of Things (IOT) | Lokulwar,P.P | Deshmukh,H.R. | 2018 | Computer Science | 3256 |
80
|
Design And Implementation of Energy Efficient System for Self-Organized Wireless Sensor Network Using clustering Approach | Sirsikar, S. | `Chandak, M. B. | 2018 | Computer Science | 3477 |
81
|
A Robust Secured Mechanism for Mobile IPV6 Threats | Barbudhe,Aumdevi K | Dhawale,C.A | 2018 | Computer Science | 4455 |
82
|
A Generic Framework for Computer Security Using Artifical Immure System. | Rajgure,Vinay A | Ali,M.S | 2018 | Computer Engg. | 4224 |
83
|
Improved Instrusion Detection and Prevention System for wlan using Intelligent Mobile Agents | Athawale,Shashikant | Pund,Mahendra A | 2018 | Computer Engg. | 4247 |
84
|
Intelligent and Case Based Reasoning Approach for Designing Personalized E-Learning System | Shekapure,S.N | Patil,Dipti.D | 2019 | Computer Engg. | 4177 |
85
|
Descion on Effecient Automatic Speech Recognition Technique for Mobile Device | Dharmale,Gulbakshee | Patil,Dipti. | 2019 | Computer Engg. | 4259 |
86
|
Design of an Enhanced Distribution Routing Protocol for Hybrid Wireles Network | Thakur,Umak | Dethe,C.G | 2019 | Computer Engg. | 4386 |
87
|
Design of Context Aware Verrtical Handoff Methodology for Mobile wireless Networks | Bhute,Harsha A | Karde,P.P | 2019 | Computer Engg. | 4411 |
88
|
Enhancement of Image Stegnography Techniques for Improvement of Security | Bartere,Mahip M | Deshmukh,Hemant R | 2019 | Computer Engg. | 4441 |
89
|
The Critical Analysis of Optimizing ERP Software with Intellingnt Custamization | Gosavi,G.R | Thakare,V.M | 2019 | Computer Engg. | 4463 |
90
|
Enhance Speech Recognition Techniques for all Treal time Application | Bhosale,Rajkumar S | Choudhari,N.S | 2019 | Computer Engg. | 4513 |
91
|
Development of Efficient Image Seg Mentation Technique | Jaiswal,Rachana S | Sarode,Milind | 2019 | Computer Engg. | 4515 |
92
|
A Novel Optimization Algoritham for mobile AD HOC Network Based on Swarm Intelligence | Zade,Amol V | 2019 | Computer Engg. | 4569 | |
93
|
Designing Model for Software Performance Testing for web Application and Services | Moharil,Pankaj | Jena,Sudarson | 2019 | Computer Science | 4265 |
94
|
Enhancing Bi-Lingual Machine Translation Approach | Rana, Manish | Atique,Mohammad | 2019 | Computer Science | 4266 |
95
|
Design of Efficient Real Time Ubiquitous Cloud Computing Architecture | Narale,Snehal A | Butey,P.K | 2019 | Computer Science | 4423 |
96
|
Design of Dynamic Multipath Secure Routing Algoritham for wireless Sensor Network | Khaiani,Simran | Pethe,C.G | 2020 | Computer Engg. | 4260 |
97
|
Virtual Memory Steaming in Cloud Environment Using Distmibuted Large Memoru and Message Passing Interface | Deshmukh,Pranjali | Amdani,S.Y | 2020 | Computer Engg. | 4308 |
98
|
Analytical Simulation and Performance Evaluation of Intelligent Adaptive Interface | Bhatt,Anuradha J | Sarode,Milindkumer | 2020 | Computer Engg. | 4542 |
99
|
Design and Development of Adaptive and Computationally Efficient Methodology for Human Body Monitoring System By Using A Smartphone | Deshpande,S.G | Butey,P.K | 2020 | Computer Sci. | 4158 |
100
|
Pattern Analysis of Web Content Using Clustering for Imporving Content Delivery | Shingarwade,Atul K | Mulkalwar,P.N | 2020 | Computer Science | 4414 |
101
|
Analysis and Performance Evaluation of Mobile Cloud Computing Attacts and Measure | Koleshwar,Ankita S | Sherekar,Swati.S | 2020 | Computer Science | 4418 |
102
|
Design and Implementatin of Efficient Mobile Web Service in Cloud Environment | Dudhe,Anil.A | Sherekar,Swati.S | 2020 | Computer Science | 4564 |
103
|
Design to Store and State Adaton on Cloud Computing Via Security Mediator and its Implementation to Secure the Data | Patokar,Ashish | Patil,V.M | 2020 | Computer Science | 4350 |
104
|
Analysis and Design of Digital Fornsic Technique for Cloud Computing | Patil,Sulabha V | Dharaskar,Rajiv.V | 2021 | Computer Engg. | 4439 |